Use the Heartbleed vulnerability to hijack user logon sessions

The Heartbleed problem is actually worse than it can be seen now (it seems to be broken now ). Heartbleed (CVE-2014-0160) is an OpenSSL vulnerability that allows any remote user to dump some of the server's memory. Yes, it's really bad. It is worth

SMB relay attacks

PS: The following are all tested by myself. It is not a theoretical article. If there is anything wrong, please make an axe. Thank you> _ First, we will introduce how SMB relay attacks work. Assume that the host on the left is A, and the host on

Introduction to Enterprise Intranet Security Planning

This article focuses on the direction of Enterprise Intranet security planning. The computer has been facing the public for just over 40 years. The world economy, science and technology and other indicators have developed rapidly. The cultivation of

Fantastic fantasy sci-fi traversal: A test of the hacker Pirni Pro

Author: Vic One day, I rushed to avoid monsters and entered an inn. The following story is purely fictitious. If there are similarities, it must be a coincidence ...] One day when the sun was shining, the sun was blank, walking alone on the official

Secure Linux Remote Desktop Management Using SSH + VNC

VNC can compress data so that the amount of data transmitted is smaller than that encrypted using SSH. However, one or two chances are that computers in the same network segment can use sniffer to eavesdrop the user name and password. Data after

How can we identify and block emerging PDF malware attacks?

Recently, I found that PDF files are increasingly used for advanced persistent threat attacks. Can you describe some new technologies used in PDF attacks? In addition, can you recommend some tools that can scan PDF malware? Can anti-malware or email

Parsing the VFS file system mechanism in Linux (I) (1)

This article describes the file system in Linux. The source code is from the IA32-based 2.4.20 kernel. In general, the file system in Linux can be divided into three main parts: one is the system call of the Upper-layer file system, and the other is

Implement software RAID (1) in Redhat Linux AS 4)

Usually, redundant disk arrays (RAID) are used on servers to protect data. High-end servers generally provide expensive hardware RAID controllers. For small and medium-sized enterprises with limited financial strength, using software in Linux to

View Windows platform security from ForeFront features

With the development of information technology, more and more enterprises are gradually improving their business processes and information processing, and moving them from manual operations to information collaboration platforms. Because Windows is

Linux security settings are robust, stable, and secure

Today, many small and medium users are constantly updating or upgrading their networks due to business growth, which leads to a large difference in their user environments. The entire network system platform is uneven, and most servers use Linux

Network security in Enterprises: Understanding server security maintenance

Server Security Maintenance Tips 1: Start from basics When we talk about network server security, the best advice I can give you is not to be a layman. When a hacker starts to launch an attack on your network, the hacker first checks whether there

Password forgotten customs clearance manual helps you reduce unnecessary troubles

Cracking several common software passwords At present, more users know how to use computer software to encrypt some of their information stored in the computer, so that those who do not have the right to read the important information can not easily

Database Encryption relies on effective key management

More and more enterprises have listened to the opinions of regulatory agencies and increased the intensity of database encryption to ensure the security of data information in the event of large-scale violations. However, without a strong and

Advantages and disadvantages of backing up tape Encryption

Undoubtedly, the security of current information is becoming more and more important. Therefore, the system administrator tries to encrypt the data as much as possible. Even so, the "Data Encryption" plan is not the best practice, especially when

Advanced SQL blind injection testing skills

  Preface: This article mainly describes some techniques to speed up blind injection and some exquisite statements in blind injection, although injection is not a new technology. However, database injection vulnerabilities still plague every

Prevent Network sniffing

The most common security threats come from the inside, and these threats are often fatal, and their destructiveness is far greater than that of external threats. Network sniffing is a simple and threatening network for security protection. Many

What did we think of when the new Internet conference was hacked?

On the afternoon of July 6, many netizens reported that the website registered with the xinnet domain name was still running normally in the morning. In the afternoon, they could not log on to or refresh the page, and the data provided in succession

Security Settings for dedicated Web site servers (1)

IIS settings: Delete the virtual directory of the default site, stop the default web site, delete the corresponding file directory c: inetpub, configure public settings for all sites, and set the connection limit, bandwidth settings, Performance

Eight reasons why hackers use Web Attacks

With the advent of the Web2.0 era, major social networking websites have become mainstream interactive media. As a mysterious force in the Internet, the idea of "hackers" is also advancing with the times. Nowadays, most hackers are more and more

Secure DMZ web server configuration Device

Q: I need to put the web server into DMZ, and the server needs to access the data in the network attached storage NAS box on the Intranet. Is there any best practices for building a secure DMZ web server? A: This is a good question. We often

Total Pages: 1330 1 .... 170 171 172 173 174 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.